Preview

Regulating Technology

Good Essays
Open Document
Open Document
840 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Regulating Technology
Regulating Technology

BIS/220
June 26, 2012
Paul Sam

Regulating Technology

Since the 1970’s, information technology has completely changed the world. Technology is an ever evolving machine whose possibilities are endless. This generation has seen more technological advances than any other generation in history. By having the ability to access and relay information so quickly, computers and other technological devices have proven to be both a blessing and a curse. Users have the ability to compile, analyze, store, retrieve and utilize information to make business processes more efficient; however, if compromised by unauthorized individuals for malevolent purposes, there can be a multitude of negative consequences. The Computer Fraud and Abuse Act, 1986 (CFAA) was designed to prevent such instances by deeming it a Federal offense to knowingly access a protected computer without authorization or exceeding one’s authorized access and as a result, causes damage. The Telephone consumer Protection Ac, 1991 (TCPA) is another Federal legislative action that governs the practices of telemarketer. The act was created to ensure a balance between protection of consumer rights and permitting companies to effectively utilize telemarketing. As a result of a myriad of technological tools, ranging from cell phones and laptops to government protected software, the U.S. Government recognized the need to create legislation that would facilitate the use of such technology to enhance our society by maintaining a secure structure for all parties.

Potential vulnerability According to Encyclopedia.com (2002), one must first study the state of the computer industry prior to 1986, when the act was created.“In 1981 IBM Corporation introduced its personal computer—the IBM-PC. By 1986, barely five years after the IBM-PC had been introduced, personal computers were being used for mainstream business purposes, and the computing power that had once been available to large



References: Computer sciences. (2002). In Encyclopedia.com. Retrieved from http://www.encyclopedia.com/topic/Computer_Fraud_and_Abuse_Act_of_1986.aspx#1-1G2:3401200032-full Kim, G. (2009, July 30). Wireless vs. landline a cultural question. Chicago Tribune. Retrieved from http://articles.chicagotribune.com/2009-07-30/news/0907290726_1_landline-cell-phone-wireless-only

You May Also Find These Documents Helpful

  • Good Essays

    Have you ever been sitting at home relaxing when the phone rings and it is a telemarketer on the other line trying to sell you something? You didn’t reach out to the company on the other line prompting this intrusion. Most of the time, you don’t even want the product they are selling. This is an issue that has plagued millions of people across the United States since the mid-to-late eighties when businesses started using the telephone in order to market and sell their products. Two Acts in particular have been passed in order to help battle telemarketers and maintain residencies’ privacy when it comes to the telephone.…

    • 453 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Regulation

    • 275 Words
    • 2 Pages

    For this assignment you will be locating a federal regulation. There are several ways you can locate regulations. You can choose to use federal and state government web sites. Sometimes you will find that the agency's web site is the best source for finding and understanding current regulations. You can also search on Westlaw.…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Government Regulations

    • 847 Words
    • 4 Pages

    In this paper I will be covering some government regulations concerning child abuse and foster care. More specifically I will be talking about the Child Abuse and Prevention Act (CAPTA), Adoption and Safe Families Act (ASFA) and the Victims of Child Abuse Act (VOCAA). I will also discuss the possible obstacles of these regulations in the health and human services field.…

    • 847 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Paper

    • 1676 Words
    • 7 Pages

    Moving pictures helped to bring about the concept of: a. leisure time b. popular culture c. elite culture d. cultural institutions e. leisure institutions 31. Wireless handheld media: a. are individual devices that do not support connectivity b. are clearly associated with interpersonal communication rather than mass communication c. have the potential to radically transform traditional media and American culture d. seem to prevent the linkage function from occurring e. will erase the “digital divide” 32. Soon after the telegraph ____ began linking people together by voice, eliminating the need to understand telegraphic codes.…

    • 1676 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    The Telecommunications Act of 1996 can be termed as a major overhaul of the communications law in the past sixty-two years. The main aim of this Act is to enable any communications firm to enter the market and compete against one another based on fair and just practices ("The Telecommunications Act 1996," The Federal Communications Commission). This Act has the potential to radically change the lives of the people in a number of different ways. For instance it has affected the telephone services both local and long distance, cable programming and other video services, broadcast services and services provided to schools. The Federal Communications Commission has actively endorsed this Act and has worked towards the enforcement and implementation of the various clauses listed in the document. The Act was basically brought into existence in order to promote competition and reduce regulation so that lower prices and higher quality services for the Americans consumers may be secured.…

    • 1317 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    For many years the Congress or Federal Government had to step into help and protect consumers by creating lawful Acts. Some of these acts are: the Family Educational Rights and Privacy Act (1974), Fair Credit Reporting Act (1970), Computer Fraud and Abuse Act, (1986), The Telephone Consumer Protection Act (1991), and Do not Call Implementation Act (2003). Presently the Federal Government has numerous acts that authorize the government to implement consumer protection; however, this paper will address only two of them. We will discuss the Telephone Consumer Protection Act (TCPA) of 1991 and the Do not Call Implementation Act of 2003.…

    • 661 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Technology has gone from the days of the pony express to advancing at a rate of a mile a minute to now evolving to what seems like the speed of light or faster. With such a fast paced environment of change in technology, policies and laws must adapt to be compatible to those advancements in order to provide the best method to govern the laws and policies and protect its people. This paper will explore how technological advancements have influenced crucial changes in two essential policies: the Electronic Communications Privacy Act (ECPA) and the Electronic Funds Transfer Act (EFTA).…

    • 410 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Government Regulations

    • 830 Words
    • 4 Pages

    Due to the fall in economy the United States has seen an increase in unemployment. Although the government is making an effort to improve this situation and the issues that follow, such as, health insurance, mental stress, and unemployment benefits, there are government regulations and standards that affect these issues chances of ever completely getting resolved for the unemployed.…

    • 830 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Att Swot

    • 630 Words
    • 3 Pages

    Cited: Sirota, William. "The Telecommunications Act of 1996: A Commentary on What Is Really Going on Here." 31 Oct. 1999. Accessed 09 June 2008…

    • 630 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Security

    • 409 Words
    • 2 Pages

    Michael Nhan SE578-Practices for Administration of Physical & Operations Security Prof: Rodney Smith How do Administrative, Technical, and Physical Controls introduce a false sense of security? According to research and studies, the leading broadband providers have accumulated a total of over 17.4 million high-speed Internet subscribers in the US” This means that in the United States alone there are more than 17 million computers with fast connections most of which are connected to the Internet 24 hours a day, 7 days a week and that number continues to grow. Having a false sense of security is very common among consumers who own and operate a PC within their homes. Nothing is ever secured. I would never say something is secured within the terms of information security. Administrative, Technical, and Physical introduce a false sense of security by the idea of what we use to safeguard sensitive data and protect consumers’ privacy. The idea of purchasing a virus protection identifies that all personal information will be safeguarded and protected, which gives consumers a false sense of security. Having a false sense of security means that I entrust beliefs that I’m guaranteed protection at all times and, that I should not be concerns about my computer being compromised because I took the necessary precautions in purchasing a virus protection. What are the consequences to the strategy if there are no verification practices? disclosure of proprietary corporate information. What can a firm do to bolster confidence in their Defense-in-Depth strategy? How do these activities relate to “Best Practices”? How can these activities be used to demonstrate regulatory compliance? Sarbanes-Oxley_Act. (n.d.). Wikipedia, the free encyclopedia. Retrieved September 21, 2008, from Reference.com website: http://dictionary.reference.com/browse/Sarbanes-Oxley_Act M2PressWIRE; 08/12/2008 Dublin: “Data New Report Details the Data Center Automation Solutions Market for 2007-2010"…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    There are several advances in information technology that resulted in new ethical issues necessitating the creation of certain acts. The two acts which will be discussed in this paper are the Children’s Internet Protection Act of 2000, and the Family Educational Rights and Privacy Act of 1974.…

    • 666 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    w2 bis221 memo

    • 486 Words
    • 3 Pages

    Information technology advances in order to keep up with the demands of the modern world. One such way, is the availability to access money from automated tellers and point of sale terminals. “Congress implemented the Electronic Funds Transfer Act in 1978 to establish the basic rights, liabilities and responsibilities of consumers who use electronic funds services and financial institutions who offer those services.” (FDIC, 2006). This law protects an individual consumer’s privacy by ensuring the financial institution protects the digital data it is storing and that it does not disseminate that information to the wrong individual. The financial institution must ensure it receives and authentic information from the consumer and accurately transfer the information into the computer system. “The ETA also identifies error resolution and limits liability for any unauthorized transactions “(FDIC, 2006).…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    British’s fourth largest mobile operator, T-Mobile who is under E E Phone Company faced an ethical dilemma that concerned the T-Mobile company recall matter in the year end of 2008 till 2009. The stuff in T-Mobile, United Kingdom allegedly sold customer data to brokers, who in turn sold it to other competing phone firms. These firms then started calling customers, whose contracts with T-Mobile were about to expire, trying to get them to switch to their network. (Maravis.com, 2014). When the investigators raided addresses, they found that the scam involved millions of records.…

    • 773 Words
    • 4 Pages
    Satisfactory Essays